default search action
IC3INA 2014: Bandung, Indonesia
- 2014 International Conference on Computer, Control, Informatics and Its Applications, IC3INA 2014, Bandung, Indonesia, October 21-23, 2014. IEEE 2014, ISBN 978-1-4799-4575-7
- Santitham Prom-on, Sirapop Na Ranong, Patcharaporn Jenviriyakul, Thepparit Wongkaew, Nareerat Saetiew, Tiranee Achalakul:
DOM: A big data analytics framework for mining Thai public opinions. 1-6 - Danial Hooshyar, Rodina Binti Ahmad, Mohd Hairul Nizam Bin Md Nasir:
A framework for automatic text-to-flowchart conversion: A novel teaching aid for novice programmers. 7-12 - Hamirul'Aini Hambali, Nursuriati Jamil, Sharifah Lailee Syed Abdullah, Hazaruddin Harun:
A rule-based segmentation method for fruit images under natural illumination. 13-18 - Hanung Adi Nugroho, N. Faisal, Indah Soesanti, Lina Choridah:
Analysis of digital mammograms for detection of breast cancer. 25-29 - Khusnul Novianingsih, Rieske Hadianti:
Modeling flight departure delay distributions. 30-34 - M. Amir Abas, T. B. Tuck, M. Dahlui:
Attendance Management System (AMS) with fast track analysis. 35-40 - Georges Freiha, Mohammad Mkhadder, Michel Owayjan:
Design of cost-effective range meter for robotic applications. 41-46 - M. Udin Harun Al Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, Ridho Luberski:
Analysis of slotted and unslotted CSMA/CA Wireless Sensor Network for E-healthcare system. 53-57 - Kannan Govindarajan, Sharipah Setapa, Kong Chee Meng, Hong Ong:
Interoperability issue between IPv4 and IPv6 in OpenFlow enabled network: IPv4 and IPv6 transaction flow traffic. 58-63 - Rachmad Vidya Wicaksana Putra, Trio Adiono:
A register-free and homogenous architecture for square root algorithm. 64-68 - Amang Sudarsono, M. Udin Harun Al Rasyid, Hendhi Hermawan:
An implementation of secure wireless sensor network for e-healthcare system. 69-74 - Fadzilah Siraj, Hawa Mohd Ekhsan, Abdul Nasir Zulkifli:
Flower image classification modeling using neural network. 81-86 - Tohari Ahmad, Hudan Studiawan, Hafidh Sholihuddin Ahmad, Royyana M. Ijtihadie, Waskitho Wibisono:
Shared secret-based steganography for protecting medical data. 87-92 - Made Sumarsana Adi Putra, Gelar Budiman, Ledya Novamizanti:
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android. 93-98 - Nur Ibrahim, Irma Safitri, Effrina Yanti Hamid, Redy Mardiana:
3D localization technique for broad band impulsive noise source. 99-104 - Suyoto Suyoto, Adit Kurniawan, Sugihartono:
Improved timing estimation based on symmetric correlator using statistical change of correlator for OFDM systems. 105-108 - Niranjan Saikumar, N. S. Dinesh:
Improved adaptation of EMPC with response sampling based prediction correction for the position control of DC motors. 109-114 - Ershad Junus Amin, Andriyan Bayu Suksmono, Achmad Munir:
Accuracy analysis of FM chirp in GNU radio-based FMCW radar for multiple target detection. 115-119 - Mritha Ramalingam, Nor Ashidi Mat Isa:
A steganography approach for sequential data encoding and decoding in video images. 120-125 - Andri Pranolo, Siti Muslimah Widyastuti:
Simple additive weighting method on intelligent agent for urban forest health monitoring. 132-135 - Mohamed S. El-Mahallawy, Esam A. A. Hagras, Sameh A. Fathy:
Genetic algorithm for PAPR reduction in SLM wavelet-OFDM systems. 136-140 - Zaki Abdurrasyid, Achmad Munir:
Characterization of thin slab artificial dielectric material using rectangular waveguide. 141-144 - Azizah, Andriyan Bayu Suksmono, Achmad Munir:
Signal processing of range detection for SFCW radars using Matlab and GNU radio. 145-148 - Julian Supardi, Intan Anindyana Hapsari, Maheyzah Md Siraj:
Handwritten alphabets recognition using twelve directional feature extraction and self organizing maps. 149-153 - Tedjo Darmanto, Iping Supriana Suwardi, Rinaldi Munir:
Animation simulation of shooting aircraft events by combination of metamorphic animation on multi-object and on object of IFS fractal model: Based on cloning and collision detection techniques. 154-159 - Dewi W. Wardani, Josef Kiing:
Semantic mapping relational to graph model. 160-165 - Tedjo Darmanto, Iping Supriana Suwardi, Rinaldi Munir:
Hybrid rotational and revolving simulation of propeller in aircraft with two propellers by fractal animation model: Based on shifting centroid method in double mode from a fixed point. 166-171 - Achmad Munir, Jane Ivonne Litouw:
Microcontroller-based programmable phase shifter for array antenna system. 172-175 - Esmeralda C. Djamal, Suprijanto, Ahmad Arif:
Identification of alertness state based on EEG signal using wavelet extraction and neural networks. 176-180 - Santi Indarjani, Gigih Supriyatno, Adi Nugraha, I Made Mustika Astawa:
Insertion attack effects on some PRNGs based on NIST randomness tests tool: Case study on ANSI-X9.17, ANSIX9.31, Dragon and Rabbit algorithms. 181-186 - Larasmoyo Nugroho:
Comparison of classical and modern landing control system for a small unmanned aerial vehicle. 187-192
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.